Computer Crime, Evidence Search and Seizure. D/S/Sgt. Arni K. Stinnissen Anti-Rackets Section Investigation Bureau Ontario Provincial Police 705 329-6400. What is Computer Crime?. Crimes Through Use of a Computer Crimes Against Computer Most Crimes Can Have a Computer Element.
Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.
D/S/Sgt. Arni K. Stinnissen
Ontario Provincial Police
“...any criminal activity involving the copy of, use of, removal of, interference with, access to, manipulation of computer systems, and/or their related functions, data or programs.”
Section defines number of computer-related terms such as “computer password”, “computer program”, “computer service”, “computer system”, “data”, “electro-magnetic, acoustic, mechanical device”, “function”, “intercept”, “traffic” (in password)
Searcher’s operation of computer system and copying equipment -- s. 487(2.1)
(2.1) A person authorized under this section to search a computer system in a building or place for data may
(a) use or cause to be used any computer system at the building or place to search any data contained in or available to the computer system;
(b) reproduce or cause to be reproduced any data in the form of a print-out or other intelligible output;
(c) seize the print-out or other output for examination or copying; and
(d) use or cause to be used any copying equipment at the place to make copies of the data.
(2.2) Every person who is in possession or control of any building or place in respect of which a search is carried out under this section shall, on presentation of the warrant, permit the person carrying out the search
(a) to use or cause to be used any computer system at the building or place in order to search any data contained in or available to the computer system for data that the person is authorized by this section to search for;
(b) to obtain a hard copy of the data and to seize it; and
(c) to use or cause to be used any copying equipment at the place to make copies of the data.